首页 | 官方网站   微博 | 高级检索  
     


Passive Attack Detection for a Class of Stealthy Intermittent Integrity Attacks
K. K. Zhang, C. Keliris, T. Parisini, B. Jiang, and M. M. Polycarpou, “Passive attack detection for a class of stealthy intermittent integrity attacks,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 4, pp. 898–915, Apr. 2023. doi: 10.1109/JAS.2023.123177
Authors:Kangkang Zhang  Christodoulos Keliris  Thomas Parisini  Bin Jiang  Marios M. Polycarpou
Affiliation:1. Department of Electrical and Electronic Engineering, Imperial College London, London SW7 2AZ, UK, and also with the KIOS Research and Innovation Center of Excellence, University of Cyprus, Nicosia 1678, Cyprus;2. KIOS Research and Innovation Center of Excellence and the Department of Electrical and Computer Engineering, University of Cyprus, Nicosia 1678, Cyprus;3. Department of Electrical and Electronic Engineering, Imperial College London, London SW7 2AZ, UK, and with the Department of Engineering and Architecture, University of Trieste, Trieste 34127, Italy, and also with the KIOS Research and Innovation Center of Excellence, University of Cyprus, Nicosia 1678, Cyprus;4. College of Automation Engineering, Nanjing University of Aeronautics and Astronautics, Nanjing 210016, China
Abstract:This paper proposes a passive methodology for detecting a class of stealthy intermittent integrity attacks in cyber-physical systems subject to process disturbances and measurement noise. A stealthy intermittent integrity attack strategy is first proposed by modifying a zero-dynamics attack model. The stealthiness of the generated attacks is rigorously investigated under the condition that the adversary does not know precisely the system state values. In order to help detect such attacks, a backward-in-time detection residual is proposed based on an equivalent quantity of the system state change, due to the attack, at a time prior to the attack occurrence time. A key characteristic of this residual is that its magnitude increases every time a new attack occurs. To estimate this unknown residual, an optimal fixed-point smoother is proposed by minimizing a piece-wise linear quadratic cost function with a set of specifically designed weighting matrices. The smoother design guarantees robustness with respect to process disturbances and measurement noise, and is also able to maintain sensitivity as time progresses to intermittent integrity attack by resetting the covariance matrix based on the weighting matrices. The adaptive threshold is designed based on the estimated backward-in-time residual, and the attack detectability analysis is rigorously investigated to characterize quantitatively the class of attacks that can be detected by the proposed methodology. Finally, a simulation example is used to demonstrate the effectiveness of the developed methodology. 
Keywords:Backward-in-time equivalent quantity   fixed-point smoother   intermittent integrity attacks
点击此处可从《IEEE/CAA Journal of Automatica Sinica》浏览原始摘要信息
点击此处可从《IEEE/CAA Journal of Automatica Sinica》下载免费的PDF全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号